Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Asus Armoury Crate Vulnerability Leads to Full System Compromise

Posted on June 17, 2025June 17, 2025 By CWS

Asus on Monday introduced patches for a high-severity vulnerability within the Armoury Crate administration software program that might result in full system compromise.

Tracked as CVE-2025-3464 (CVSS rating of 8.8), the bug is described as an authorization bypass rooted in a Time-of-check Time-of-use subject.

In line with Cisco Talos, which recognized the flaw, an attacker can set off the safety defect by making a crafted onerous hyperlink and bypass authorization to an Armoury Crate-specific driver.

A centralized software, Armoury Crate is used for the administration of {hardware} elements and peripherals, providing numerous system configuration, driver and firmware replace, RGB illumination, and system efficiency capabilities.

CVE-2025-3464 is said to the AsIO3.sys digital driver that Armoury Crate makes use of for sure performance, and the Asusgio3 system the driving force creates.

For cover functions, entry to the driving force is proscribed to the AsusCertService.exe and processes whose PIDs are added by it, and an identical SHA-256 hash.

Nevertheless, Talos found that an attacker may create a tough hyperlink pointing to an executable in the identical listing as AsusCertService.exe, which leads to the perform checking the SHA-256 hash studying the trusted binary, resulting in authorization bypass.

“As a result of authorization bypass, any consumer can get hold of a deal with to the system, which exposes quite a few functionalities important from a safety perspective,” Talos explains.Commercial. Scroll to proceed studying.

An attacker that already has entry to a susceptible system can exploit the vulnerability to map bodily reminiscence addresses, entry I/O port communication directions, learn/write values from/to MSR register, and extra.

“We consider that this vulnerability is important and offers a possible attacker with quite a few simple methods to escalate privileges and take management of the whole system,” Talos notes.

On Monday, Asus introduced that CVE-2025-3464 impacts Armoury Crate variations between 5.9.9.0 and 6.1.18.0, urging customers to replace their installations to the most recent model as quickly as potential.

Associated: Excessive-Severity Vulnerabilities Patched in Tenable Nessus Agent

Associated: GreyNoise Flags 9,000 ASUS Routers Backdoored Through Patched Vulnerability

Associated: Asus DriverHub Vulnerabilities Expose Customers to Distant Code Execution Assaults

Associated: Over 30 Vulnerabilities Patched in Android

Security Week News Tags:Armoury, ASUS, Compromise, Crate, Full, Leads, System, Vulnerability

Post navigation

Previous Post: New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks
Next Post: How to Protect Your Backups

Related Posts

Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’ Security Week News
The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
CloudSEK Raises $19 Million for Threat Intelligence Platform Security Week News
Carding Marketplace BidenCash Shut Down by Authorities  Security Week News
LevelBlue to Acquire Trustwave to Create Major MSSP Security Week News
UK Sanctions Russian Hackers Tied to Assassination Attempts Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News